All in one features of whole the world, learn at least one of them to be super hacker :)
- RMS - Runtime Mobile Security, powered by FRIDA, is a powerful web interface that helps you to manipulate Android and iOS Apps at Runtime.
- MOBSF - Mobile Security Framework is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware analysis and security assessment framework capable of performing static and dynamic analysis.
- Dexcalibur - an Android reverse engineering platform focus on instrumentation automation
- Drozer - the leading security testing framework for Android.
- Appmon - an automated framework for monitoring and tampering system API calls
- Objection - a runtime mobile exploration toolkit, powered by Frida, built to help you assess the security posture of your mobile applications, without needing a jailbreak.
- MARA - a Mobile Application Reverse engineering and Analysis Framework. It is a tool that puts together commonly used mobile application reverse engineering and analysis tools
- AndroPyTool - This is a tool for extracting static and dynamic features from Android APKs. It combines different well-known Android apps analysis tools such as DroidBox, FlowDroid, Strace, AndroGuard or VirusTotal analysis
- Apktool - A tool for reverse engineering Android apk files
- Dex2jar - Tools to work with android .dex and java .class files
- Jadx - Command line and GUI tools for producing Java source code from Android Dex and Apk files
- Bytecode Viewer - a lightweight user-friendly Java/Android Bytecode Viewer, Decompiler & More
- APK Studio - It features a friendly IDE-like layout including code editor with syntax highlighting support for .smali code files.
- APKLab - The ultimate Android RE experience right inside your VS Code.
- Simplify - Generic Android Deobfuscator
- Smali - smali/baksmali is an assembler/disassembler for the dex format used by dalvik, Android's Java VM implementation.
- Smali-CFGs - Smali Control Flow Graph's
- Android backup extractor - Utility to extract and repack Android backups created with adb backup
- Androguard - Androguard is a full python tool to play with Android files.
- Enjarify - a tool for translating Dalvik bytecode to equivalent Java bytecode. This allows Java analysis tools to analyze Android applications.
- Fernflower - is the first actually working analytical decompiler for Java and probably for a high-level programming language in general.
- Redexer - a reengineering tool that manipulates Android app binaries. This tool is able to parse a DEX file into an in-memory data structure;
- Andromeda - makes initial reverse engineering work of Android applications bit faster and easier. Compared to other alternatives, it's written in C/C++ and has a noticeable performance advantage
- Obfuscapk - a modular Python tool for obfuscating Android apps without needing their source code
- Cutter - reverse-engineering platform while keeping the user experience in mind.
- QARK - Quick Android Review kit is designed to look for several security related Android application vulnerabilities, either in source code or packaged APKs
- APKLeaks - Scanning APK file for URIs, endpoints & secrets.
- AndroidAnalysisGUI
- ApkAnalyser - ApkAnalyser is a static, virtual analysis tool for examining and validating the development work of your Android app
- Androwarn - a tool whose main aim is to detect and warn the user about potential malicious behaviours developped by an Android application.
- ASAF - Argus-SAF is a static analysis framework that we build in house to do security vetting for Android applications.
- Infer - a static analysis tool for Java, C++, Objective-C, and C. Infer is written in OCaml.
- AndroBugs - an Android vulnerability analysis system that helps developers or hackers find potential security vulnerabilities in Android applications
- Nogotofail - a network security testing tool designed to help developers and security researchers spot and fix weak TLS/SSL connections and sensitive cleartext traffic
- ClassyShark - supports multiple formats including libraries (.dex, .aar, .so), executables (.apk, .jar, .class) and all Android binary XMLs: AndroidManifest, resources, layouts etc.
- Apkx - Decompilation for the Lazy, a Python wrapper to popular free dex converters and Java decompilers.
- Mobile Audit - Django application that performs SAST and Malware Analysis for Android APKs
- Quark-Engine - Android malware analysis engine
- Super - Secure, Unified, Powerful and Extensible Rust Android Analyzer
- Trueseeing - trueseeing is a fast, accurate and resillient vulnerabilities scanner for Android apps
- StaCoAn - a crossplatform tool which aids developers, bugbounty hunters and ethical hackers performing static code analysis on mobile applications
- Frida - Dynamic instrumentation toolkit for developers, reverse-engineers, and security researchers.
- Xposed - Xposed is a framework for modules that can change the behavior of the system and apps without touching any APKs
- Inspeckage - a tool developed to offer dynamic analysis of Android applications. By applying hooks to functions of the Android API, Inspeckage will help you understand what an Android application is doing at runtime
- CuckooDroid - Open Source software for automating analysis of suspicious files, CuckooDroid brigs to cuckoo the capabilities of execution and analysis of android application.
- DECAF - Dynamic Executable Code Analysis Framework
- ARTist - a flexible open source instrumentation and hybrid analysis framework for Android apps and Android’s Java middleware.
- Magisk - the mask for android, rooting and stuff
- AndBug - AndBug is a debugger targeting the Android platform's Dalvik virtual machine intended for reverse engineers and developers
- Radare2 - Unix-Like Reverse Engineering Framework, dit from local hard drives, kernel memory, programs, remote gdb servers and be able to analyze, emulate, debug, modify and disassemble any binary.
- Dwarf - A debugger for reverse engineers, crackers and security analyst
- apk-mitm - Inspecting a mobile app's HTTPS traffic using a proxy is probably the easiest way to figure out how it works.
- mitmproxy - is an interactive, SSL/TLS-capable intercepting proxy with a console interface for HTTP/1, HTTP/2, and WebSockets.
- tcpdump - a command line packet capture utility. It can capture packets from your Wi-Fi connection, cellular connections, and any other network connections
- Burp Suite - Best in class for security testing And Http intercepting
- ZAP - Zed Attack Proxy
- Wireshark - is the world’s foremost and widely-used network protocol analyzer
- Fridump - using the Frida framework to dump accessible memory addresses from any platform supported
- Brida - Brida is a Burp Suite Extension that, working as a bridge between Burp Suite and Frida
- r2frida - Radare2 and Frida better together.
- XposedFridaBridge - A frida script implement XposedBridge & load xposed modules, without installing xposed framwork.
- RMS - Runtime Mobile Security, powered by FRIDA, is a powerful web interface that helps you to manipulate Android and iOS Apps at Runtime.
- Noia - Noia is a web-based tool whose main aim is to ease the process of browsing mobile applications sandbox and directly previewing SQLite databases, images, and more. Powered by frida.re.
- PAPIMonitor - Python API Monitor for Android apps is a python tool based on Frida for monitoring user-select APIs during the app execution
- House - A runtime mobile application analysis toolkit with a Web GUI, powered by Frida, written in Python
- DroidBox - developed to offer dynamic analysis of Android applications
- Diff-gui - Uses flask for a web framework , jinja for templates , redis for message que , server side push for real time updates and some js .
- Cloudspy - This is a proof-of-concept web app built on top of Frida.
- Aurora - This is a proof-of-concept web app built on top of Frida.
- [Android Malware Sandbox](Android Malware Sandbox) - This project aim to provide a simple configurable and modulable sandbox for quickly sandbox known or unknown families of Android Malware.
- Oversecured - automatically scans for all known mobile vulnerabilities, including arbitrary code execution, theft of arbitrary files and cross-site scripting
- Virustotal - nalyze suspicious files and URLs to detect types of malware, automatically
- kaspersky
- Bitbaan - the first iranian startup in malware analysis
- DeGuard - Statistical Deobfuscation for Android
- Appdetonator
- pithus - Mobile threat intelligence for the masses
- nowsecure
- opswat
- ostorlab
- quixxisecurity
- visualthreat
- jotti
- appknox - not free
- Android check - Static code analysis plugin for Android project.
- Findbugs Idea - Provides static byte code analysis to look for bugs in Java code from within IntelliJ IDEA
- Error Prone - a static analysis tool for Java that catches common programming mistakes at compile-time.
- Checkstyle - Checkstyle is a tool for checking Java source code for adherence to a Code Standard or set of validation rules (best practices).
- Gradle static analysis plugin - A Gradle plugin to easily apply the same setup of static analysis tools across different Android, Java or Kotlin projects.
- PMD - a source code analyzer
- AMDH - Android Mobile Device Hardening written with python3.